Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Microtek Learning LLC
  4. SC-100T00: Microsoft Cybersecurity Architect Training

SC-100T00: Microsoft Cybersecurity Architect Training

The SC-100T00: Microsoft Cybersecurity Architect Training is a comprehensive course designed to prepare IT professionals for the role of a cybersecurity architect. This training focuses on Microsoft's cybersecurity solutions and frameworks, aiming to equip participants with the skills needed to design and implement robust security strategies within an organization.

Key components of the training include:

  1. Security Concepts and Practices: Understanding fundamental security principles and how they apply to different environments.
  2. Microsoft Security Technologies: In-depth coverage of Microsoft security solutions, including Azure Security, Microsoft Sentinel, and Microsoft Defender.
  3. Designing Security Solutions: Techniques for designing effective security architectures that meet organizational needs and compliance requirements.
  4. Incident Response and Management: Strategies for managing and responding to security incidents and threats.
  5. Risk Management: Identifying and mitigating potential security risks within an IT infrastructure.

This training is essential for professionals aiming to advance their careers in cybersecurity, particularly those interested in leveraging Microsoft technologies to enhance their organization's security posture. The course prepares participants for the SC-100 exam, which certifies their expertise as a Microsoft Cybersecurity Architect.

Course Overview

Overall Proficiency Level
3 - Advanced
Course Prerequisites
  • Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications.
  • Experience with hybrid and cloud implementations.
Training Purpose
Functional Development
Skill Development
Management Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
  • Online, Instructor-Led

Learning Objectives

After taking this course, you will be able to:

  • Design a Zero Trust strategy and architecture
  • Design security for infrastructure
  • Design a strategy for data and applications
  • Evaluate Governance Risk Compliance (GRC) technical strategies and security operations strategies

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Competency Areas

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: